Skip to content

Commit ec7160a

Browse files
Merge pull request #294779 from yash177-maker1/docs-editor/architecture-network-design-co-1739841566
Update architecture-network-design-considerations.md
2 parents 399199c + a728d43 commit ec7160a

File tree

1 file changed

+27
-6
lines changed

1 file changed

+27
-6
lines changed

articles/azure-vmware/architecture-network-design-considerations.md

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,33 @@ Due to asymmetric routing, connectivity issues can occur when Azure VMware Solut
2424
For AS-Path Prepend, consider the following prerequisites:
2525

2626
> [!div class="checklist"]
27-
> * The key point is that you must prepend **Public** ASN numbers to influence how Azure VMware Solution routes traffic back to on-premises. If you prepend using _Private_ ASN, Azure VMware Solution will ignore the prepend, and the ECMP behavior mentioned previously will occur. Even if you operate a Private BGP ASN on-premises, it's still possible to configure your on-premises devices to utilize a Public ASN when prepending routes outbound, to ensure compatibility with Azure VMware Solution.
28-
> * Design your traffic path for private ASNs after the public ASN to be honored by Azure VMware Solution. The Azure VMware Solution ExpressRoute circuit doesn't strip any private ASNs that exist in the path after the public ASN is processed.
29-
> * Both or all circuits are connected to Azure VMware Solution through Azure ExpressRoute Global Reach.
30-
> * The same netblocks are being advertised from two or more circuits.
31-
> * You wish to use AS-Path Prepend to force Azure VMware solution to prefer one circuit over another.
32-
> * Use either 2-byte or 4-byte public ASN numbers.
27+
* The key point is that you must prepend **Public** Autonomous System Numbers (ASNs) to influence how Azure VMware Solution routes traffic back to on-premises. If you prepend using _Private_ ASN, Azure VMware Solution will ignore the prepend, and the ECMP behavior mentioned previously will occur. Even if you operate a Private BGP ASN on-premises, it's still possible to configure your on-premises devices to utilize a Public ASN when prepending routes outbound, to ensure compatibility with Azure VMware Solution.
28+
* Design your traffic path for private ASNs after the public ASN to be honored by Azure VMware Solution. The Azure VMware Solution ExpressRoute circuit doesn't strip any private ASNs that exist in the path after the public ASN is processed.
29+
* Both or all circuits are connected to Azure VMware Solution through Azure ExpressRoute Global Reach.
30+
* The same netblocks are being advertised from two or more circuits.
31+
* You want to use AS-Path Prepend to force Azure VMware solution to prefer one circuit over another.
32+
* Use either 2-byte or 4-byte public ASN numbers.
33+
34+
35+
## Reserved Private ASNs in Azure VMware Solution
36+
37+
Azure VMware Solution utilizes specific private Autonomous System Numbers (ASNs) for its underlay network infrastructure. To prevent conflicts and ensure seamless network integration, customers **should not** use the following ASNs within their network configurations.
38+
39+
### Reserved ASNs for Underlay Networking
40+
41+
The following ASNs are reserved for internal Azure VMware Solution infrastructure and should be avoided by customers:
42+
43+
- **Tier-2 ASNs:** 65300 – 65340
44+
45+
- **Tier-1 ASNs:** 65200 – 65240
46+
47+
- **Transport ASNs (T0 Gateways):** 64513 (NSX Edges), 64600 – 64940
48+
49+
- **Management ASNs:** 65000 – 65412
50+
51+
### Impact of Using Reserved ASNs
52+
53+
Using any of the ASNs listed above in your environment may lead to BGP session failures, network routing conflicts, or service disruptions. Ensure that your ASN assignments do not overlap with these reserved values.
3354

3455
## Management VMs and default routes from on-premises
3556

0 commit comments

Comments
 (0)